Статті в журналах з теми "Software and hardware security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Software and hardware security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Gilmont, T., J. D. Legat, and J. J. Quisquater. "Hardware security for software privacy support." Electronics Letters 35, no. 24 (1999): 2096. http://dx.doi.org/10.1049/el:19991424.
Повний текст джерелаLamparth, Oliver, and Frank Bähren. "Hardware and Software Security in Infotainment Systems." Auto Tech Review 4, no. 12 (December 2015): 24–27. http://dx.doi.org/10.1365/s40112-015-1050-2.
Повний текст джерелаLamparth, Oliver, and Frank Bähren. "Hardware and Software Security in Infotainment Systems." ATZelektronik worldwide 10, no. 3 (May 30, 2015): 34–37. http://dx.doi.org/10.1007/s38314-015-0522-0.
Повний текст джерелаSidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (August 10, 2019): 42. http://dx.doi.org/10.3390/jsan8030042.
Повний текст джерелаMACHER*, Georg, Harald SPORER, Eugen BRENNER, and Christian KREINER. "Signal-Layer Security and Trust-Boundary Identification based on Hardware-Software Interface Definition." Journal of Ubiquitous Systems and Pervasive Networks 10, no. 1 (March 7, 2018): 1–9. http://dx.doi.org/10.5383/juspn.10.01.001.
Повний текст джерелаGranado-Criado, José M., Miguel A. Vega-Rodríguez, Juan M. Sánchez-Pérez, and Juan A. Gómez-Pulido. "Hardware security platform for multicast communications." Journal of Systems Architecture 60, no. 1 (January 2014): 11–21. http://dx.doi.org/10.1016/j.sysarc.2013.11.007.
Повний текст джерелаKonikiewicz, Wojciech, and Marcin Markowski. "Analysis of Performance and Efficiency of Hardware and Software Firewalls." Journal of Applied Computer Science Methods 9, no. 1 (June 1, 2017): 49–63. http://dx.doi.org/10.1515/jacsm-2017-0003.
Повний текст джерелаKitsos, P., N. Sklavos, K. Papadomanolakis, and O. Koufopavlou. "Hardware implementation of bluetooth security." IEEE Pervasive Computing 2, no. 1 (January 2003): 21–29. http://dx.doi.org/10.1109/mprv.2003.1186722.
Повний текст джерелаDadashzadeh, Mohammad. "Choosing IT Platforms In The Age Of Stuxnet." Journal of Cybersecurity Research (JCR) 2, no. 1 (December 1, 2017): 17–26. http://dx.doi.org/10.19030/jcr.v2i1.10076.
Повний текст джерелаZhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.
Повний текст джерелаГорлов, Алексей, Aleksey Gorlov, Михаил Рытов, Mikhail Rytov, Дмитрий Лысов, and Dmitriy Lysov. "AUTOMATED SYSTEM FOR ESTIMATION-EFFICIENCYSOFTWARE MEANS OF IN-FORMATION PROTECTION." Automation and modeling in design and management of 2019, no. 2 (June 23, 2019): 25–32. http://dx.doi.org/10.30987/article_5cf2d22c9dcd72.20436206.
Повний текст джерелаXiaoying Liang. "Information System Security Design Using Hardware/Software Co-design Technology." International Journal of Digital Content Technology and its Applications 6, no. 8 (May 31, 2012): 351–60. http://dx.doi.org/10.4156/jdcta.vol6.issue8.41.
Повний текст джерелаTomecek, Jozef. "Hardware optimizations of stream cipher rabbit." Tatra Mountains Mathematical Publications 50, no. 1 (December 1, 2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.
Повний текст джерелаMathew, Jimson, Rajat Subhra Chakraborty, Durga Prasad Sahoo, Yuanfan Yang, and Dhiraj K. Pradhan. "A Novel Memristor-Based Hardware Security Primitive." ACM Transactions on Embedded Computing Systems 14, no. 3 (May 21, 2015): 1–20. http://dx.doi.org/10.1145/2736285.
Повний текст джерелаLavrischeva, Ekaterina Mikhailovna, and Sergey Vadimovich Zelenov. "Model-Based Approach to Ensuring Reliability and Security of Web-services." Proceedings of the Institute for System Programming of the RAS 32, no. 5 (2020): 153–66. http://dx.doi.org/10.15514/ispras-2020-32(5)-12.
Повний текст джерелаNightingale, Edmund B., Daniel Peek, Peter M. Chen, and Jason Flinn. "Parallelizing security checks on commodity hardware." ACM SIGPLAN Notices 43, no. 3 (March 25, 2008): 308–18. http://dx.doi.org/10.1145/1353536.1346321.
Повний текст джерелаDesnitsky, V., and A. Meleshko. "SECURITY ANALYSIS OF SOFTWARE AND HARDWARE COMPONENTS IN WIRELESS SENSOR NETWORKS." Telecom IT 7, no. 1 (2019): 75–83. http://dx.doi.org/10.31854/2307-1303-2019-7-1-75-83.
Повний текст джерелаWang, Li Nan. "Research on Data Security of Finance Software." Applied Mechanics and Materials 380-384 (August 2013): 2494–98. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2494.
Повний текст джерелаAzuaje, Rafael. "Securing IoT: Hardware Vs Software." Journal of Advances in Information Technology 9, no. 3 (2018): 79–83. http://dx.doi.org/10.12720/jait.9.3.79-83.
Повний текст джерелаBiernacki, Lauren, Mark Gallagher, Zhixing Xu, Misiker Tadesse Aga, Austin Harris, Shijia Wei, Mohit Tiwari, Baris Kasikci, Sharad Malik, and Todd Austin. "Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (August 2021): 1–38. http://dx.doi.org/10.1145/3456299.
Повний текст джерелаStiles, Doug. "The Hardware Security Behind Azure Sphere." IEEE Micro 39, no. 2 (March 1, 2019): 20–28. http://dx.doi.org/10.1109/mm.2019.2898633.
Повний текст джерелаDrzevitzky, Stephanie, Uwe Kastens, and Marco Platzner. "Proof-Carrying Hardware: Concept and Prototype Tool Flow for Online Verification." International Journal of Reconfigurable Computing 2010 (2010): 1–11. http://dx.doi.org/10.1155/2010/180242.
Повний текст джерелаChen, Kejun, Lei Sun, and Qingxu Deng. "Hardware and software co-verification from security perspective in SoC platforms." Journal of Systems Architecture 122 (January 2022): 102355. http://dx.doi.org/10.1016/j.sysarc.2021.102355.
Повний текст джерелаRushinek, Avi, and Sara F. Rushinek. "Accounting software evaluation: hardware, audit trails, backup, error recovery and security." Managerial Auditing Journal 10, no. 9 (December 1995): 29–37. http://dx.doi.org/10.1108/02686909510100887.
Повний текст джерелаRana, Samir, Ritu Mewari, and Lata Nautiya. "Anti-theft Security System for Vehicles." International Journal of Engineering & Technology 7, no. 4.12 (October 4, 2018): 42. http://dx.doi.org/10.14419/ijet.v7i4.12.20990.
Повний текст джерелаNATALIANA, DECY, SABAT ANWARI, and MUHAMMAD SYAHRUL AKBAR. "Implementasi Prototype Sistem Home security dengan Pemanfaatan Kode Akses berbasis Arduino Mega." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 5, no. 2 (February 16, 2018): 119. http://dx.doi.org/10.26760/elkomika.v5i2.119.
Повний текст джерелаIstván, Zsolt, Soujanya Ponnapalli, and Vijay Chidambaram. "Software-defined data protection." Proceedings of the VLDB Endowment 14, no. 7 (March 2021): 1167–74. http://dx.doi.org/10.14778/3450980.3450986.
Повний текст джерелаZhu, Xiao Jing, and Yuan Guai Lin. "Analysis of Web Attack and Design of Defense System." Advanced Materials Research 756-759 (September 2013): 2428–32. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2428.
Повний текст джерелаAchumba, Ifeyinwa Eucharia, Kennedy Chinedu Okafor, Gloria N. Ezeh, and Uchenna Hermes Diala. "OpenFlow Virtual Appliance." International Journal of Digital Crime and Forensics 7, no. 2 (April 2015): 31–52. http://dx.doi.org/10.4018/ijdcf.2015040103.
Повний текст джерелаBaraneetharan, E. "Review on Deep Learning based Network Security Tools in Detecting Real-Time Vulnerabilities." Journal of Ubiquitous Computing and Communication Technologies 3, no. 4 (January 31, 2022): 289–302. http://dx.doi.org/10.36548/jucct.2021.4.005.
Повний текст джерелаShadeed Al-Mejibli, Intisar, and Dr Nawaf Rasheed Alharbe. "ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY." Iraqi Journal for Computers and Informatics 46, no. 1 (June 30, 2020): 32–39. http://dx.doi.org/10.25195/ijci.v46i1.248.
Повний текст джерелаKaliberda, Elena A., and Andrey M. Shabalin. "SOFTWARE AND HARDWARE STAND AS A MODERN TOOL FOR TEACHING STUDENTS TO CONFIGURE WIRELESS NETWORKS." Russian Journal of Education and Psychology 13, no. 6 (December 20, 2022): 45–59. http://dx.doi.org/10.12731/2658-4034-2022-13-6-45-59.
Повний текст джерелаM., Vardhana, and Anil Kumar Bhat. "VLSI Implementation and Software Co-Simulation of Digital Image Watermarking with Increased Security." International Journal of Sensors, Wireless Communications and Control 10, no. 4 (December 18, 2020): 634–38. http://dx.doi.org/10.2174/2210327909666190319150314.
Повний текст джерелаHenkel, Jorg. "Top Picks in Hardware and Embedded Security." IEEE Design & Test 38, no. 3 (June 2021): 4. http://dx.doi.org/10.1109/mdat.2021.3077859.
Повний текст джерелаAlhirabi, Nada, Omer Rana, and Charith Perera. "Security and Privacy Requirements for the Internet of Things." ACM Transactions on Internet of Things 2, no. 1 (February 2021): 1–37. http://dx.doi.org/10.1145/3437537.
Повний текст джерелаPayne, Jeffery. "Integrating Application Security into Software Development." IT Professional 12, no. 2 (March 2010): 6–9. http://dx.doi.org/10.1109/mitp.2010.58.
Повний текст джерелаBrant, Christopher, Prakash Shrestha, Benjamin Mixon-Baca, Kejun Chen, Said Varlioglu, Nelly Elsayed, Yier Jin, Jedidiah Crandall, and Daniela Oliveira. "Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking." ACM Computing Surveys 55, no. 1 (January 31, 2023): 1–33. http://dx.doi.org/10.1145/3483790.
Повний текст джерелаXiao, Chunhua, Lei Zhang, Yuhua Xie, Weichen Liu, and Duo Liu. "Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing." Security and Communication Networks 2018 (August 27, 2018): 1–24. http://dx.doi.org/10.1155/2018/7631342.
Повний текст джерелаGertner, D. A., D. О. Leontiev, L. S. Nosov, and D. S. Shuchalin. "Hardware and software complex for ensuring information security when using electronic signatures." Vestnik Syktyvkarskogo Universiteta. Seriya 1: Matematika. Mekhanika. Informatika, no. 1 (2021): 43–55. http://dx.doi.org/10.34130/1992-2752_2021_1_43.
Повний текст джерелаPeng, Xiang, Peng Zhang, and Hanben Niu. "Architecture design of virtual-optics data security using parallel hardware and software." Optik 115, no. 1 (2004): 15–22. http://dx.doi.org/10.1078/0030-4026-00322.
Повний текст джерелаLiu, Yi, Hong-qi Zhang, Jiang Liu, and Ying-jie Yang. "A New Approach for Delivering Customized Security Everywhere: Security Service Chain." Security and Communication Networks 2017 (2017): 1–17. http://dx.doi.org/10.1155/2017/9534754.
Повний текст джерелаBawane, Manjiri R., Madhavi S. Borkar, Payal R. Wawarkar, Sanika M. Shende, Heena K. Chandel, and Ketki R. Bhakare. "USB Key Based Antipiracy Solution." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 2 (February 28, 2015): 12–17. http://dx.doi.org/10.53555/nncse.v2i2.507.
Повний текст джерелаZambreno, Joseph, Alok Choudhary, Rahul Simha, Bhagi Narahari, and Nasir Memon. "SAFE-OPS: An approach to embedded software security." ACM Transactions on Embedded Computing Systems 4, no. 1 (February 2005): 189–210. http://dx.doi.org/10.1145/1053271.1053279.
Повний текст джерелаRehman, Shafiq, and Volker Gruhn. "An Effective Security Requirements Engineering Framework for Cyber-Physical Systems." Technologies 6, no. 3 (July 12, 2018): 65. http://dx.doi.org/10.3390/technologies6030065.
Повний текст джерелаGavrilenko, Andrei V. "DISTANCE LEARNING AND INFORMATION SECURITY." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 1 (2021): 51–65. http://dx.doi.org/10.28995/2686-679x-2021-1-51-65.
Повний текст джерелаChen, Yun Ping. "Study on the Design of Computer Interlocking System Security's Reliability." Applied Mechanics and Materials 416-417 (September 2013): 1454–57. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1454.
Повний текст джерелаAlekseev, V. V., V. A. Gridnev, A. V. Yakovlev, O. S. Mashkova, U. A. Savilova, D. A. Shibkov, and D. A. Yakovleva. "A System Approach to the Construction of the Software and Hardware Complex for Training Information Security Specialists." Vestnik Tambovskogo gosudarstvennogo tehnicheskogo universiteta 27, no. 1 (2021): 020–30. http://dx.doi.org/10.17277/vestnik.2021.01.pp.020-030.
Повний текст джерелаAl-Qassim, Mohammed A., and Emad H. Al-Hemiary. "Network Perimeter Defenses Using Open-Source Software." Iraqi Journal of Information & Communications Technology 1, no. 2 (July 27, 2018): 41–51. http://dx.doi.org/10.31987/ijict.1.2.22.
Повний текст джерелаYu, Ran, Jiao Jiao Zhang, Hong Fei Xu, and Shen Jin. "An Integrated Electricity Information Security Monitoring Platform." Applied Mechanics and Materials 701-702 (December 2014): 947–51. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.947.
Повний текст джерелаMittal, Sparsh, Himanshi Gupta, and Srishti Srivastava. "A survey on hardware security of DNN models and accelerators." Journal of Systems Architecture 117 (August 2021): 102163. http://dx.doi.org/10.1016/j.sysarc.2021.102163.
Повний текст джерела